- Description
- An XSS issue was discovered in Roundcube Webmail before 1.2.13, 1.3.x before 1.3.16, and 1.4.x before 1.4.10. The attacker can send a plain text e-mail message, with JavaScript in a link reference element that is mishandled by linkref_addindex in rcube_string_replacer.php.
- Source
- cve@mitre.org
- NVD status
- Analyzed
- Products
- webmail, fedora, debian_linux
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Data from CISA
- Vulnerability name
- Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
- Exploit added on
- Jun 22, 2023
- Exploit action due
- Jul 13, 2023
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
I have added the fancy_bear tag to KEVIntel to all the vulnerabilities mentioned in the latest CISA advisory • CVE-2023-23397 • CVE-2020-12641 • CVE-2020-35730 • CVE-2021-44026 • CVE-2023-38831 https://t.co/ZrIVvM3JXC
@ethicalhack3r
22 May 2025
248 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
#APT28 Different XSS vulnerabilities being used to target additional webmail software: Horde, MDaemon, and Zimbra. Roundcube CVE-2020-35730 CVE-2023-43770 MDaemon CVE-2024-11182 Outlook Elevation of Privilege Vul CVE-2023-23397 Zimbra CVE-2024-27443 https://t.co/VX2gyK5WkH https:
@blackorbird
16 May 2025
3161 Impressions
22 Retweets
63 Likes
23 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A26F38AE-C3AB-4A9D-A097-F88FFF3351A1",
"versionEndExcluding": "1.2.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE535CF3-A0B8-4305-86BE-A6F2CD446827",
"versionEndExcluding": "1.3.16",
"versionStartIncluding": "1.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B77F6D2-7493-4ED5-997E-5D3A168B56D7",
"versionEndExcluding": "1.4.10",
"versionStartIncluding": "1.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]